{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T20:47:30Z","timestamp":1760042850061,"version":"3.28.0"},"reference-count":52,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1109\/ase51524.2021.9678880","type":"proceedings-article","created":{"date-parts":[[2022,1,20]],"date-time":"2022-01-20T20:33:49Z","timestamp":1642710829000},"page":"79-91","source":"Crossref","is-referenced-by-count":10,"title":["Context Debloating for Object-Sensitive Pointer Analysis"],"prefix":"10.1109","author":[{"given":"Dongjie","family":"He","sequence":"first","affiliation":[]},{"given":"Jingbo","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Jingling","family":"Xue","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3428247"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3381915"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1561\/2500000014"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(98)00093-7"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53413-7_24"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167488"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640108"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985827"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572274"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/199448.199462"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/345099.345137"},{"key":"ref29","article-title":"Program analysis and specialization for the C programming language","author":"andersen","year":"1994","journal-title":"Ph D Dissertation University of Copenhagen"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31057-7_30"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36579-6_12"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1044834.1044835"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3276511"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3133924"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594320"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3088515.3088519"},{"key":"ref26","first-page":"1","article-title":"Accelerating Object-Sensitive Pointer Analysis by Exploiting Object Containment and Reachability","volume":"194","author":"he","year":"2021","journal-title":"35th European Conference on Object-Oriented Programming (ECOOP 2021) ser Leibniz International Proceedings in Informatics (LIPIcs)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3450492"},{"key":"ref50","first-page":"22:1","article-title":"Boomerang: Demand-driven flow-and context-sensitive pointer analysis for Java","author":"sp\u00e4th","year":"2016","journal-title":"Eur Conference on Object-Oriented Programming"},{"article-title":"Two approaches to interprocedural data flow analysis","year":"1978","author":"sharir","key":"ref51"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3009837.3009848"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00034"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1926385.1926390"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236041"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062360"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062359"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3276510"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3360574"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1925805.1925818"},{"article-title":"Doop-framework for Java pointer and taint analysis (using P\/Taint)","year":"2021","author":"smaragdakis","key":"ref17"},{"year":"2020","key":"ref18","article-title":"WALA: T. J. Watson Libraries for Analysis"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/566172.566174"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250748"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010248"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134018"},{"key":"ref5","first-page":"15:1","article-title":"Program tailoring: Slicing by sequential criteria","author":"li","year":"2016","journal-title":"Eur Conference on Object-Oriented Programming"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1512475.1512486"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950296"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238185"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134027"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1094811.1094817"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2259016.2259050"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001440"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462191"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1251535.1251540"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025160"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/996841.996859"}],"event":{"name":"2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","start":{"date-parts":[[2021,11,15]]},"location":"Melbourne, Australia","end":{"date-parts":[[2021,11,19]]}},"container-title":["2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9678507\/9678392\/09678880.pdf?arnumber=9678880","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:57:43Z","timestamp":1652201863000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9678880\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/ase51524.2021.9678880","relation":{},"subject":[],"published":{"date-parts":[[2021,11]]}}}